
Research
/Security News
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
github.phpd.cn/theckman/go-pwnedpasswords
Package pwnedpasswords implements a client for checking passwords against the "Have I Been Pwned", Pwned Passwords API. The Pwned Passwords API implements a k-Anonymity model that allows you to check your password against the database without providing the API the full password or full SHA-1 password hash.
This works by creating a SHA-1 hash of the password locally, hex-encodes the SHA-1 checksum, and then sends the first five bytes (prefix) to the Pwned Passwords API. The API then returns the suffix of hashes it has that start with that prefix. The client then compares the returned hashes locally to look for a match. This prevents the password, hashed or not, from leaving the local system.
In effect, this allows you to confirm if your password is seen in one of the many database dumps where passwords were obtained. If your password is not on the list, it does not mean that it is safe or hasn't been compromised. Always remember to never share passwords between different sites or services, as the compromise of one can lead to the compromise of all of your accounts.
This code is released under the MIT License. Please see the LICENSE for the full content of the license.
If you have the Go toolchain installed, you can use the following command to
install the pwnedpasswords command line client (pp
):
go get github.com/theckman/go-pwnedpasswords/cmd/pp
If you plan to use this package as a client library in Go, here is a quick example of how to use it:
client, err := pwnedpasswords.New(pwnedpasswords.DefaultURL)
// handle error
compromiseCount, err := client.Check([]byte("password"))
// handle error
// password was compromised on at least compromiseCount sites
if compromiseCount > 0 {
// handle situation where password is compromised
// in other words, never using it ever again...
}
// password may not be compromised
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
Product
Customize license detection with Socket’s new license overlays: gain control, reduce noise, and handle edge cases with precision.
Product
Socket now supports Rust and Cargo, offering package search for all users and experimental SBOM generation for enterprise projects.